Skip to main content

Part of the book series: Computer Architecture and Design Methodologies ((CADM))

  • 1162 Accesses

Abstract

Onset of cloud computing allowed various IT services to be outsourced to cloud service providers (CSP). This includes the management and storage of users’ structured or unstructured data called Database as a Service (DBaaS). However, users need to trust the CSP to protect their data, which is inherent in all cloud-based services. Enterprises and Small-to-Medium Businesses (SMB) see this as a roadblock in adopting cloud services because they do not have full control of the security of the stored data on the cloud. Due to these security issues, one possible solution for the data owners is to store their sensitive data in encrypted form. However, to take full advantage of cloud database as service, FHE enabled SQL processing is a promising solution, which will be elaborated in this chapter.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Ahn G-J, Sandhu R (2000) Role-based authorization constraints specification. ACM Trans Inf Syst Secur 3:207–226

    Article  Google Scholar 

  • Balduzzi M, Zaddach J, Balzarotti D, Kirda E, Loureiro S (2012) A security analysis of Amazon’s elastic compute cloud service. In: SAC

    Google Scholar 

  • Bernardo D, Assumpçao G (2009) Advanced SQL injection to operating system full control. In: Black hat Europe

    Google Scholar 

  • Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. Advances in cryptology – EUROCRYPT 2004, vol 3027. Lecture notes in computer science. Springer, Berlin, pp 506–522

    Chapter  Google Scholar 

  • Bradford Contel (2018) 7 most infamous cloud security breaches. StorageCraft Technology Corporation from https://blog.storagecraft.com/7-infamous-cloud-security-breaches/

  • Chatterjee A, SenGupta I (2018) Translating algorithms to handle fully homomorphic encrypted data on the cloud. IEEE Trans Cloud Comput 6(1):287–300

    Article  Google Scholar 

  • Chatterjee A, Manish Kaushal, SenGupta I (2013) Accelerating sorting of fully homomorphic encrypted data. INDOCRYPT 2013. Springer, Berlin, pp 262–273

    Chapter  Google Scholar 

  • Egorov M, Wilkison M (2016) ZeroDB white paper. CoRR abs arXiv:1602.07168

  • Felipe MR, Aung KMM, Ye X, Yonggang W (2015) StealthyCRM: a secure cloud crm system application that supports fully homomorphic database encryption. In: International conference on cloud computing research and innovation (ICCCRI)

    Google Scholar 

  • FHE library HElib (2018). https://github.com/shaih/HElib

  • Grubbs P, McPherson R, Naveed M, Ristenpart T, Shmatikov V (2016) Breaking web applications built on top of encrypted data. In: CCS

    Google Scholar 

  • Grubbs P, Ristenpart T, Shmatikov V (2017) Why your encrypted database is not secure. In: HotOS. pp 162–168

    Google Scholar 

  • Guan Q, Zhang Z, Fu S (2011) Proactive failure management by integrated unsupervised and semi-supervised learning for dependable cloud systems. In: Proceeding 2011 6th international conference on availability reliability and security, ARES ’11. Washington, DC, USA, pp 83–90

    Google Scholar 

  • Huang C-T, Huan L, Qin Z, Yuan H, Zhou L, Varadharajan V, Jay Kuo C-C (2014) Survey on securing data storage in the cloud. ATSIP. https://doi.org/10.1017/ATSIP.2014.6

  • Juels A, Kaliski BS Jr (2007) Pors: proofs of retrievability for large files. In: Proceeding of 14th ACM conference on computer and communications security, CCS ’07. pp 584–597

    Google Scholar 

  • Kumar RS, Saxena A (2011) Data integrity proofs in cloud storage. In: 2011 3rd International conference on communication systems and networks (COMSNETS), pp 1–4

    Google Scholar 

  • Lewko AB, Okamoto T, Sahai A, Takashima K, Waters B (2010) Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. Advances in cryptology EUROCRYPT 2010, vol 6110. Lecture notes in computer science. Springer, Berlin, pp 62–91

    Chapter  Google Scholar 

  • Lillibridge M, Elnikety S, Birrell A, Burrows M, Isard M (2003) A cooperative Internet backup scheme. In: Proceeding of USENIX annual technical conference, ATEC ’03. USENIX Association, Berkeley, CA, USA, pp 285–298

    Google Scholar 

  • Lillibridge M, Elnikety S, Birrell A, Burrows M, Isard M, Ateniese G et al (2007) Provable data possession at untrusted stores. In: Proceeding of 14th ACM conference on computer and communications security, CCS ’07. New York, NY, USA, pp 598–609

    Google Scholar 

  • Miguel RF, Dash A, Aung KMM (2016) A study of secure dbaas with encrypted data transactions. In: Proceedings of the 2nd international conference on communication and information processing, ICCIP ’16. pp 43–47

    Google Scholar 

  • Popa RA, Redfield CMS, Zeldovich N, Balakrishnan H (2011) CryptDB: protecting confidentiality with encrypted query processing. In: Proceedings of the 23rd ACM symposium on operating systems principles (SOSP). Cascais, Portugal

    Google Scholar 

  • Ristenpart T, Yilek S (2010) When good randomness goes bad: virtual machine reset vulnerabilities and hedging deployed cryptography. In: NDSS

    Google Scholar 

  • Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Advances in Cryptology – EUROCRYPT 2005. 24th Annual international conference on the theory and applications of cryptographic techniques, Aarhus, Denmark, May 22–26. Lecture notes in computer science, vol 3494. Springer, Berlin, pp 457–473

    Google Scholar 

  • Sandhu RS, Coyne EJ, Feinstein HL, Youman CE (1996) Role-based access control models. Computer 29(2):38–47

    Article  Google Scholar 

  • Storer MW, Greenan K, Long DDE, Miller EL (2008) Secure data deduplication. In Proceeding of 4th ACM international workshop on storage security and survivability, storageSS ’08. New York, NY, USA, pp 1–10

    Google Scholar 

  • Transaction processing performance council, TPC Benchmark H. http://www.tpc.org/tpc_documents_current_versions/current_specifications.asp. Accessed 22 Jul 2018

  • Verizon data breach incident report (2016). https://regmedia.co.uk/2016/05/12/dbir2016.pdf

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ayantika Chatterjee .

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Chatterjee, A., Aung, K.M.M. (2019). Secure Database Handling. In: Fully Homomorphic Encryption in Real World Applications. Computer Architecture and Design Methodologies. Springer, Singapore. https://doi.org/10.1007/978-981-13-6393-1_5

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-6393-1_5

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-6392-4

  • Online ISBN: 978-981-13-6393-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics